CVE-2024-32647: vyper performs double eval of raw_args in create_from_blueprint
(updated )
Using the create_from_blueprint
builtin can result in a double eval vulnerability when raw_args=True
and the args
argument has side-effects.
A contract search was performed and no vulnerable contracts were found in production. In particular, the raw_args
variant of create_from_blueprint
was not found to be used in production.
References
- github.com/advisories/GHSA-3whq-64q2-qfj6
- github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2024-208.yaml
- github.com/vyperlang/vyper
- github.com/vyperlang/vyper/blob/cedf7087e68e67c7bfbd47ae95dcb16b81ad2e02/vyper/builtins/functions.py
- github.com/vyperlang/vyper/security/advisories/GHSA-3whq-64q2-qfj6
- nvd.nist.gov/vuln/detail/CVE-2024-32647
Detect and mitigate CVE-2024-32647 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →